Author of the publication

Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance.

, , and . J. AIS, 20 (12): 4 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Nuances of Privacy and Security in the Context of Information Systems., , and . AMCIS, Association for Information Systems, (2017)Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method., and . AMCIS, Association for Information Systems, (2012)Government of the People, By the People: A Look at Trust in eGovernment., , , , and . AMCIS, Association for Information Systems, (2012)Issues in wireless E-commerce., and . SIGecom Exch., 1 (1): 21-25 (2000)Social identity and trust in internet-based voting adoption., , , , and . Gov. Inf. Q., 35 (2): 195-209 (2018)Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption., , and . ICIS, Association for Information Systems, (2013)Gender deception in asynchronous online communication: A path analysis., , , , and . Inf. Process. Manag., 53 (1): 21-41 (2017)The effects of social media use on control of corruption and moderating role of cultural tightness-looseness., , , , and . Gov. Inf. Q., (2019)Is the responsibilization of the cyber security risk reasonable and judicious?, , , , and . Comput. Secur., (2018)Reactions to Abusive Supervision: Neutralization and IS Misuse., , , and . J. Comput. Inf. Syst., 62 (3): 632-641 (2022)